aiotestking uk

NS0-157 Exam Questions - Online Test


NS0-157 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 1) 

A customer has a 4-node cluster. Two nodes have FlashCache and the other two nodes have Flash Pools. The customer is interested in deploying and OLTP application with a workload that consists of an extreme number of small random writes on four LUNs spread across four volumes. 

What should the customer do to improve performance for the OLTP application? 

A. Place all volumes for the application on the nodes with Flash Pools. 

B. Deploy all volumes for the application on the two nodes with the FlashCache installed. 

C. Split the volumes between the two nodes with FlashCache and two of the nodes with Flash Pools. 

D. Place the volume with the highest read load on the Flash Pool nodes and place the other volumes on the FlashCache nodes. 

Answer:

Q2. - (Topic 3) 

Which types of LIFs can be assigned a user-defined failover group? (choose all that apply) 

A. Cluster LIF 

B. Node-management LIF 

C. Cluster-management LIF 

D. NAS data LIF (NFS,CIFS) 

E. SAN data LIF (iSCSI, FC) 

Answer: B,C,D 

Q3. - (Topic 2) 

Which statement is true about a SnapMirror destination vserver? 

A. It must have a read-only Vserver root volume. 

B. It must be in the same cluster as the source Vserver 

C. It must be created with the same language type as the source Vserver. 

D. It must have a different storage efficiency policy than the source Vserver. 

Answer:

Explanation: 

Training material: Clustered_Data_ONTAP_82_Data_Protection_Guide How volume SnapMirror works with deduplication You can use volume SnapMirror to replicate a deduplicated volume regardless of size of the volume and logical data in the volume. When using volume SnapMirror with deduplication, you must consider the following information: You can enable deduplication on the source system, the destination system, or both systems. 

The shared blocks are transferred only once. Therefore, deduplication also reduces the use of network bandwidth. When the volume SnapMirror relationship is broken, the default deduplication schedule is applied at the destination storage system. When configuring volume SnapMirror and deduplication, you should coordinate the deduplication scheduleand the volume SnapMirror schedule. You should start volume SnapMirror transfers of a deduplicated volume after the deduplication operation is complete. This schedule prevents the sending of undeduplicated data and additional temporary metadata files over the network. If the temporary metadata files in the source volume are locked in Snapshot copies, these files consume extra space in the source and destination volumes. 

Q4. - (Topic 2) 

Which snapmirror identifies backup vault relationship? 

A. SV 

B. DP 

C. BV 

D. LS 

E. XDP 

Answer:

Q5. - (Topic 3) 

How can you prevent a single SnapMirror relationship from utilizing more than the desired bandwidth? 

A. Specify a SnapMirror throttle for the destination mode 

B. Specify a SnapMirror throttle for the whole cluster 

C. Specify a SnapMirror throttle for that relationship 

D. Enable SnapMirror network compression 

Answer:

Q6. - (Topic 2) 

What are four characteristics of a NAS LIF? (Choose four.) 

A. It has a logical interface connection. 

B. It can be associated with a Fibre Channel port. 

C. It can be associated with a WWPN. 

D. It can be associated with an Ethernet port. 

E. It can be associated with an interface group (ifgrp) 

F. It can be associated with an IP address. 

Answer: A,D,E,F 

Q7. - (Topic 2) 

With clustered Data ONTAP 8.2 or later, an administrator may use NDMP commands at which two levels? (Choose Two) 

A. Node 

B. Cluster 

C. Intercluster 

D. Vserver 

Answer: A,D 

Q8. - (Topic 2) 

Which command configures the Remote Support Agent (RSA)? 

A. rsa init 

B. system services web 

C. system services rsa 

D. vserver services rsa 

Answer:

Explanation: 

https://library.netapp.com/ecm/ecm_download_file/ECMP1200040 https://library.netapp.com/ecm/ecm_download_file/ECMP1200040 which states "Steps 

1. Connect to the SP/RLM with your SSH client by entering the applicable command: %> ssh admin@sp-IP %> ssh newly-created-account@sp-IP 

2. Use the SP/RLM version command to verify that the service processor is using the latest firmware. 

3. Start an interactive configuration session by using the rsa setup command." 

Q9. - (Topic 3) 

Which protocol(s) does Infinite Volumes support? 

A. All supported protocols on Data ONTAP 

B. NFSv3 and NFSv4 only 

C. NFSv2 and NFSv3 only 

D. File access and protocol improvements 

E. NFSv3 and SMB 1.0 only 

Answer:

Explanation: Infinite Volumes use the unified security style, which enables all clients to view and set file permissions, regardless of the file permissions that are currently in effect on a given file or directory. Unified security style also facilitates access checks using both Windows and UNIX credentials. 

https://library.netapp.com/ecmdocs/ECMP1511540/html/GUID-E1463130-422D-45CB-B9C2-D041258F88B0.html